By Topic

IET Information Security

Issue 2 • Date June 2010

Filter Results

Displaying Results 1 - 7 of 7
  • On the security of an identity-based proxy multi-signature scheme

    Publication Year: 2010, Page(s):45 - 48
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (126 KB)

    In 2000, Yi et al. proposed two proxy multi-signature schemes which enable two or more original signers to delegate their signing power to a proxy signer. Combining proxy multi-signature with identity-based cryptography, Wang et al. proposed an identity-based proxy multi-signature scheme in 2007. Their scheme is claimed to be secure in the random oracle model. However, in this study,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algebraic cryptanalysis of a small-scale version of stream cipher Lex

    Publication Year: 2010, Page(s):49 - 61
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (321 KB)

    In this study, the authors analyse with respect to algebraic attacks a small-scale version of the stream cipher Lex. They base it on a small-scale version of the block cipher advanced encryption standard (AES) with 16-bit state and 16-bit key. They represent the small-scale Lex and its key schedule in two alternative ways: as a system of cubic boolean equations and as a system of quadratic boolean... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous voting by two-round public discussion

    Publication Year: 2010, Page(s):62 - 67
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (184 KB)

    In 2006, Hao and Zieliński proposed a two-round anonymous veto protocol (called AV-net), which provided exceptional efficiency compared to related techniques. In this study, the authors add a self-tallying function to the AV-net, making it a general-purpose voting protocol. The new protocol works in the same setting as the AV-net ́ it requires no trusted third parties or private cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative communications based on trust model for mobile ad hoc networks

    Publication Year: 2010, Page(s):68 - 79
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (577 KB)

    Wireless networks provide a realm in which cooperation among large numbers of egoists can be attained. As the non-cooperative behaviours of nodes will significantly degrade the network performance, effective cooperation incentive of nodes has become a hot issue in cooperative communication. Although a reputation system can stimulate nodes to cooperate with each other, the recommendation-based trus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining frequent itemsets in the presence of malicious participants

    Publication Year: 2010, Page(s):80 - 92
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (496 KB)

    Privacy preserving data mining (PPDM) algorithms attempt to reduce the injuries to privacy caused by malicious parties during the rule mining process. Usually, these algorithms are designed for the semi-honest model, where participants do not deviate from the protocol. However, in the real-world, malicious parties may attempt to obtain the secret values of other parties by probing attacks or collu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous roaming in universal mobile telecommunication system mobile networks

    Publication Year: 2010, Page(s):93 - 103
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (362 KB)

    A secure roaming protocol for mobile networks is proposed. Roaming has been analysed in some schemes from the security point of view; however, there are vulnerabilities in most of them and so the claimed security level is not achieved. The scheme offered by Wan et al. recently is based on hierarchical identity-based encryption, in which the roaming user and the foreign network mutually auth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attribute-based ring signature scheme with constant-size signature

    Publication Year: 2010, Page(s):104 - 110
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (167 KB)

    An attribute-based ring signature scheme with constant size and constant number of pairings computation is proposed. The signer signs messages by using a subset of its attributes. All the users who possess the subset of these attributes form a ring. It requires that anyone cannot tell who generates the signature in this ring. Furthermore, anyone out of this ring could not forge the signature on be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org